58 free online courses in cybersecurity, cryptography and blockchain from the best universities in the world
Advertising for paid courses creeps in from all the cracks, but few people know that there are tons of free online courses and, at times, better quality than paid ones.
I bring to your attention 58 free online courses from the world’s leading universities. (If you have something to add – write in a personal or comments)
HackerOne
HackerOne is a bug bounty and vulnerability search platform that connects corporations and penetration testers and cybersecurity professionals. HackerOne has released their free ethical hacker training course.
Stanford University
One of the world’s best universities has published a 23-hour free course in cryptography.
Caltech
Caltech talks about quantum cryptography. 10 weeks for 6-8 hours.
Princeton University
IBM
more courses
- Software Security from University of Maryland, College Park
- Cryptography from University of Maryland, College Park
- Intro to Information Security from Georgia Institute of Technology
- Bitcoin and Cryptocurrencies from University of California, Berkeley
- Finding Your Cybersecurity Career Path from University of Washington
- Building a Cybersecurity Toolkit from University of Washington
- Cybersecurity: The CISO’s Viewfrom University of Washington
- Introduction to Cybersecurity from University of Washington
- Cyber Attack Countermeasures from New York University (NYU)
- Introduction to Cyber Attacks from New York University (NYU)
- Enterprise and Infrastructure Security from New York University (NYU)
- Cryptocurrency and Blockchain: An Introduction to Digital Currencies from University of Pennsylvania
- Cryptocurrency and Blockchain Technology Explained from University of Michigan
- Blockchain and Cryptocurrency Explained from University of Michigan
- Blockchain Technology from University of California, Berkeley
- Number Theory and Cryptography from University of California, San Diego
- Network security from Georgia Institute of Technology
- Real-Time Cyber Threat Detection and Mitigation from New York University (NYU)
- Hacker Tools from Massachusetts Institute of Technology
- Cyber-Physical Systems Design & Analysis from Georgia Institute of Technology
- Cyber-Physical Systems Security from Georgia Institute of Technology
- Cyber Security Economics from Delft University of Technology
- Introduction to Cybersecurity for Business from University of Colorado System
- Cyber Security Basics: A Hands-on Approach by Universidad Carlos iii de Madrid
- The Cyber Security Landscape from Coventry University
- Cybersecurity and Mobility from University System of Georgia
- Homeland Security & Cybersecurity Connection – It’s Not About the Terrorists from University of Colorado System
- Detecting and Mitigating Cyber Threats and Attacks from University of Colorado System
- Cybersecurity and Privacy in the IoT from Curtin University
- Cybersecurity and the X-Factor from University System of Georgia
- Cybersecurity and the Internet of Things from University System of Georgia
- Cyber-Physical Systems: Modeling and Simulation from University of California, Santa Cruz
- Unlocking Information Security: Part Ⅰ from Tel Aviv University
- Unlocking Information Security: Part ⅠⅠ from Tel Aviv University
- Internet History, Technology, and Security from University of Michigan
- Web Security Fundamentals from KU Leuven University
- Usable security from University of Maryland, College Park
- Identifying Security Vulnerabilities from University of California, Davis
- Identifying Security Vulnerabilities in C / C ++ Programming from University of California, Davis
- Exploiting and Securing Vulnerabilities in Java Applications from University of California, Davis
- Cloud Security Basics from University of Minnesota
- Proactive Computer Security from University of Colorado System
- AWS Fundamentals: Addressing Security Risk from Amazon Web Services
- Linux Server Management and Security from University of Colorado System
- Cloud Computing Security from University of Colorado System
- Cloud Computing Security from University System of Maryland
- Hardware Security from University of Maryland, College Park
- Information Security: Context and Introduction from University of London International Programs
- Systems and Application Security from (ISC) ²
- Security Operations and Administration from (ISC) ²
- Access Controls from (ISC) ²
- The Merkle Tree and Cryptocurrencies from University of California, Irvine
- Malicious Software and its Underground Economy: Two Sides to Every Story from University of London International Programs